MoinMoin rsslink() Function page_name Parameter XSS

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

A wiki application on the remote web server is affected by a cross-
site scripting vulnerability.

Description :

The MoinMoin install hosted on the remote web server fails to properly
sanitize user-supplied input in the 'page_name' parameter when creating
an rss link. An attacker may be able to leverage this issue to inject
arbitrary HTML and script code into a user's browser to be executed
within the security context of the affected site.

Note that the application is also reportedly affected by a directory
traversal vulnerability (CVE-2012-6080) as well as a remote code
execution vulnerability (CVE-2012-6081). Nessus has not, however,
tested for these additional issues.

See also :

http://moinmo.in/SecurityFixes

Solution :

Upgrade to version 1.9.6 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 64931 ()

Bugtraq ID: 57089

CVE ID: CVE-2012-6082